The Official Thread: Live audio feeds, scanners, and... wait for it.. ENCRYPTION!

BinaryMode

Blonde Once Said To Call Her But Never Answerd
Joined
Jul 3, 2023
Messages
766
Location
75 parsecs this way -->
To plays Devil's advocate, the whitepaper entitled: Insecurity in Public-Safety Communications: APCO Project 25, published January 2012 does go into some of the hacker stuff that one could do...

But actually breaking AES 256 is not happening anytime soon without some serious server resources and good reliable Intel and metadata to help reduce the brute force. This is what you would do now with Hashcat or John The Ripper... Although not for P25 encryption.


Speaking of Ferris Brewer's Day Off, I thought this was funny.

 

12dbsinad

Member
Joined
Mar 15, 2010
Messages
2,005
To plays Devil's advocate, the whitepaper entitled: Insecurity in Public-Safety Communications: APCO Project 25, published January 2012 does go into some of the hacker stuff that one could do...

But actually breaking AES 256 is not happening anytime soon without some serious server resources and good reliable Intel and metadata to help reduce the brute force. This is what you would do now with Hashcat or John The Ripper... Although not for P25 encryption.


Speaking of Ferris Brewer's Day Off, I thought this was funny.

I bet Elon Musk could do it
 

Echo4Thirty

Active Member
Premium Subscriber
Joined
Oct 6, 2021
Messages
850
Location
Spring,TX
I bet Elon Musk could do it
The solution to this problem (and often others) is to throw money and resources at the problem until its figured out. They didnt crack Enigma in WW2 with one guy in a basement, they had numerous smartie guys with tons of money and tons of new fangled inventions in various nations to do it. Even then, it was not an overnight thing. AES? You need many orders of magnitues more than Enigma.
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
6,826
Location
Sector 001
i've not read a valid argument for encryption.
Encryption is used to keep unauthorized listeners, from listening. If you are not a member/employee of the agency that uses 2-way radio comms, then you are unauthorized. People listening with scanners fall in the 'unauthorized' category. Hence, AES256. 6

LE is just daring us to shut it off and force a downgrade attack, or a side channel attack, and when they know how cheap and easy the whole radio system can be shut down, then they'll regret the vendors who set them up for failure. and it's better off avoided for all sorts of technological reasons. I met dozens of people like myself at defcon who already automate attacks.
Good luck with that sport. I look forward to seeing the creative charges they come up with when you get caught.
encryption is unwise. it's certainly not the secrecy they're after.
It's privacy they are after. AES256 gives them that privacy.
i just wouldn't dare the hardcore long time radio crowd.
L. M. F. A. O.

You ain't doing **** bro.
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
6,826
Location
Sector 001
The solution to this problem (and often others) is to throw money and resources at the problem until its figured out. They didnt crack Enigma in WW2 with one guy in a basement, they had numerous smartie guys with tons of money and tons of new fangled inventions in various nations to do it. Even then, it was not an overnight thing. AES? You need many orders of magnitues more than Enigma.
And a new algorithm will be developed, with a much larger keyspace than is currently used, and the games will continue. It's no different than what happened to DES. Processing power got to the point where a 56bit keyspace could be exhausted in a relatively short period of time.

Quantum computing will eventually make AES256 look as weak DES56 is now to modern GPU processors.

At the end of the day, the *****ing and moaning about encryption, and encrypted public safety comms will continue on.
 

INDY72

Monitoring since 1982, using radios since 1991.
Joined
Dec 18, 2002
Messages
14,842
Location
Indianapolis, IN
And a new algorithm will be developed, with a much larger keyspace than is currently used, and the games will continue. It's no different than what happened to DES. Processing power got to the point where a 56bit keyspace could be exhausted in a relatively short period of time.

Quantum computing will eventually make AES256 look as weak DES56 is now to modern GPU processors.

At the end of the day, the *****ing and moaning about encryption, and encrypted public safety comms will continue on.
And then they will go TDMA control channels with encryption and encryption on talkgroups and good luck to you. Whee!
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
6,826
Location
Sector 001
Ill refrain from posting why this is a bad idea, but if you think a downgrade attack will work on an encrypted radio system, you clearly do not understand how encyphered P25 (or DMR, or NXDN for that matter) emissions work.
Dude is just throwing out all the buzzwords.
As for why they encrypt? Working with several different agencies on various different state/local systems, it boiled down to a simple concept: People external to the agency who could listen couldnt keep their mouths shut, including the one time one of them served a warrant and their was a scanner that just happened to not have the tac talkgroup in it. The bottom line is that its never as a result of those who have a scanner and just want to listen. Its the ones that take that data and either throw it on facebook or somewhere else. Or show up to harrass them.
This. The compete lack of a barrier to entry. I'll leave it there so we don't piss off the mods.
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
6,826
Location
Sector 001
And then they will go TDMA control channels with encryption and encryption on talkgroups and good luck to you. Whee!
They don't even need to use TDMA. Just encrypt the control channel. Game over, not even Metadata. All you get is a carrier on a particular frequency centre.
 

BinaryMode

Blonde Once Said To Call Her But Never Answerd
Joined
Jul 3, 2023
Messages
766
Location
75 parsecs this way -->
At the end of the day, the *****ing and moaning about encryption, and encrypted public safety comms will continue on.

As it should be. The right of the people to express their free speech and the need for transparency....

At the end of the day, people need to realize we REALLY do live in a dystopia world where most public safety can't even offer up a 30 minute delayed feed. Those public safety agencies that currently do I applaud and thank them for their willingness to be open and transparent while at the same time keep certain Comms secure.

Now law enforcement departments that chose full on NSA level TOP SECRET for the whole enchilada up to fire departments are tossing out this BS - yes BS about the Fed's (FBI) mandating privacy with data and records. That's been the Norm since I don't know when with NCIC and dispatch using secure phone lines and whatnot. It's just rather peculiar how I'm hearing this and what I call an excuse used all of a sudden in addition to the other definitive list of excuses for why NSA TOP SECRET encryption like the aforementioned "officer safety," ya know? Especially when data (licenses plates and DL checks, etc) can be on a dedicated talkgroup (channel). At least that's generally the case for my area. And understandably may be different in other areas. But you could direct all data to talkgroup XYZW and leave dispatch in the clear. TAC channels and whatnot can remain encrypted as they should be.

It's a shame what America has become today. I truly do feel like the quasi SS (Schutzstaffel) is at the helm of the Executive branch (law enforcement). Especially with all the surplus military crap. And I can bet at least three state lotteries many millions of others in this the U.S. share in that same sentiment. But don't get me wrong, I support the police of course. But there's a fine line between massive government run a muck and Andy Griffith like it should be. Then again, due to what is social disarray and social upheaval who's catalyst IS the government, our society in this country is not like that of Norway et al.

The "swamp," or what I like to call the sewer, is in all branches and all agencies it seems. Local, state and federal. Even the bloody EPA and its hundreds of NV goggles for what ever the hell reason. Did I make use of the word dystopia yet?


Generals gathered in their masses, just like witches at black masses... ♫♯♪♫♯♪
 

KevinC

The big K
Super Moderator
Joined
Jan 7, 2001
Messages
12,389
Location
Home
And you can thank THUGS, CRIMINALS, DOPE DEALERS and others for using Radio Comms to aid in the ACTIVITY and know where they are and when they are responding.

Which has been illegal for decades, but is it enforced/prosecuted?
I'm sure I posted this before and probably in this thread...

We had an agency go encrypted with the reason of they have caught many criminals using "scanner apps". Doesn't sound like those apps were doing them any good to me if they got caught.

Oh yeah, their rates of robbery/theft/burglary have only gone up since they went encrypted. Not saying encryption caused it, it just didn't help reduce crime.
 

pitheus

Member
Premium Subscriber
Joined
Mar 10, 2019
Messages
80
Having spent some time in law enforcement, more criminals, at least in my area get caught by citizens via the police using open air transmissions to dispatch units and updates. Many civilians will be made aware of the crime via their scanners and some that are in that area start taking notice of strangers in the area or suspicious activity. Some hear the vehicle tag number or description of person and began to search for it and many civilians find it before officers spot it. It takes a good mix of police and civilians working together to take a chunk out of crimes. Personally I hate encryption, always have and always will. A good example happened the other as a male robbed a store in my town, dispatch gave it out to officers and a civilian heard it on his mobile scanner, was in the area and saw the male as described walking, darting in and out of a back street, he called the males location in to 911 which in turn related it to officers whom still were 4 minutes out from the area. Well, the man had managed to get a mile away on foot between the dispatch 1st call and the civilian update. Another civilian on the west side of town heard the location and saw the male also whom had now taken a break on a bench outside a business 1.5 miles from the site of the crime, called it in to 911 and gave the new location out to responding officers whom were searching back near the crime scene. Finally 2 units converged on the guy and made the arrest. Had not the 2 good citizens stayed on top of this the cops would not have caught him, the business would be out the cash and jewels and the criminal would probably have committed another crime by the end of the day.
 
Top